Results

By type

          2022-06-07 10:16:33,800 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-07 10:16:34,831 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-07 10:16:35.616  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 07, 2022 10:16:37 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 07, 2022 10:16:37 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 07, 2022 10:16:37 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 07, 2022 10:16:37 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-07 10:16:38.301 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-07 10:16:38.609  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-07 10:16:38.783  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-07 10:16:39.516 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-07 10:16:39.520 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-07 10:16:39.523 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-07 10:16:39.530 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-07 10:16:39.571 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-07 10:16:39.575 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-07 10:16:39.709 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-07 10:16:40.343 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 07, 2022 10:16:41 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-07 10:16:41.356  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.353 seconds (JVM running for 10.264)
Jun 07, 2022 10:17:10 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-07 10:17:33.166  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 10:17:33.177 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 10:17:33.231 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 10:17:33.236 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 10:17:33.254  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-07 10:17:33.256  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 10:17:33.257  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 10:17:33.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 10:17:33.259 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 10:17:33.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 10:17:33.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 10:17:33.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 10:17:33.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 10:17:33.316 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 10:17:33.317 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 10:17:33.320 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 10:17:33.946  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 10:17:33.949  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 10:17:33.949 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 10:17:33.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 10:17:33.960  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 10:17:33.961  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 10:17:33.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 10:17:33.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 10:17:33.963 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 10:17:33.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 10:17:33.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 10:17:33.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 10:17:33.991 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 10:17:33.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 10:17:33.992 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 10:17:33.994 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 10:17:34.020 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d2:f2:bf:0a:48:56:f0:2c:61:cc:fe:a3:99:bc:ec:dc:5d:ed:9a:57]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 11:38:37.726  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 11:38:37.729 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 11:38:37.732 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:38:37.734 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 11:38:37.735  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:38:37.736  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 11:38:37.737  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 11:38:37.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 11:38:37.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 11:38:37.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 11:38:37.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 11:38:37.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:38:37.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:38:37.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:38:37.996  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 11:38:37.997  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 11:38:37.997 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 11:38:37.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:38:38.001  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 11:38:38.001  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 11:38:38.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:38:38.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:38:38.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:38:38.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:38:38.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:38:38.004 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:38:38.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:38:38.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:38:38.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:38:38.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 11:38:38.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: a77e5a71dbcd94eadfb110703506440d0657af85d8ffbce18199cf83b76c1834eccdb8c352623d8cdd9fe08cbf773c9c6f0b829fe4e6d84186a85d417e86c30b8ed74332f2d7b4360b60fbe5e0377ad94fa8b5ceed9fced48d7715dae05f49355388e4fd1b35e5f14b253b27e34c1a77d14ba13add81165a9ac32abf55f049b950178272e5d1557b0ec0f2ab8af4a9fd3f7056361b7767f2954009e4188739621e4e371b00f452e9444b9ce0c15bb4ecc79d8733c6e7deaac6e6c4811430ef5de76c8851a21df03cb0a1984f0be92fc51f4bb13d7b717b13c68911f34ea05bcf8f0f3bb103b28872abb7526c5fd12a59a1ae2409631d60d6e025a49a5d4c80e4708bd979690497b2c4e0d8b51e95882b0bcc4f9c6ac037feaa193c8323de820c445ffb388a541913cce31c1ca2c12e59f658f919e87c1cd533c0c0580d1e93dbe732ed97d7a3f6c31f2c8581d75a38d52f0f6f52bcb647d576dfee418deb777ea1163f728530c007cedfe81d7d1a3fe1554b69f6b0412adca1807b37b0cad515
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:69:ef:43:91:cd:14:36:e9:a6:b9:07:fd:a6:00:16:8e:26:75:32]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 11:40:26.094  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 11:40:26.097 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 11:40:26.099 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 11:40:26.100 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 11:40:26.101  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-07 11:40:26.102  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 11:40:26.102  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 11:40:26.103 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 11:40:26.103 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 11:40:26.104 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 11:40:26.116 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 11:40:26.117 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:40:26.118 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:40:26.118 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:40:26.303  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 11:40:26.304  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 11:40:26.304 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 11:40:26.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:40:26.307  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 11:40:26.308  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 11:40:26.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:40:26.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:40:26.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:40:26.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:40:26.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:40:26.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:40:26.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:40:26.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:40:26.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:40:26.314 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 11:40:26.319 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [69:f6:63:eb:c0:60:39:7a:95:ae:b7:0a:e3:79:2e:67:89:21:05:e3]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 11:41:54.200  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 11:41:54.202 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 11:41:54.203 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 11:41:54.204 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 11:41:54.204  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-07 11:41:54.206  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 11:41:54.206  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 11:41:54.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 11:41:54.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 11:41:54.207 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 11:41:54.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 11:41:54.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:41:54.214 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:41:54.214 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:41:54.503  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 11:41:54.504  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 11:41:54.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 11:41:54.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:41:54.508  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 11:41:54.508  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 11:41:54.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:41:54.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:41:54.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:41:54.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:41:54.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:41:54.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:41:54.512 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:41:54.512 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:41:54.512 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:41:54.513 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 11:41:54.518 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: a77e5a71dbcd94eadfb110703506440d0657af85d8ffbce18199cf83b76c1834eccdb8c352623d8cdd9fe08cbf773c9c6f0b829fe4e6d84186a85d417e86c30b8ed74332f2d7b4360b60fbe5e0377ad94fa8b5ceed9fced48d7715dae05f49355388e4fd1b35e5f14b253b27e34c1a77d14ba13add81165a9ac32abf55f049b950178272e5d1557b0ec0f2ab8af4a9fd3f7056361b7767f2954009e4188739621e4e371b00f452e9444b9ce0c15bb4ecc79d8733c6e7deaac6e6c4811430ef5de76c8851a21df03cb0a1984f0be92fc51f4bb13d7b717b13c68911f34ea05bcf8f0f3bb103b28872abb7526c5fd12a59a1ae2409631d60d6e025a49a5d4c80e4708bd979690497b2c4e0d8b51e95882b0bcc4f9c6ac037feaa193c8323de820c445ffb388a541913cce31c1ca2c12e59f658f919e87c1cd533c0c0580d1e93dbe732ed97d7a3f6c31f2c8581d75a38d52f0f6f52bcb647d576dfee418deb777ea1163f728530c007cedfe81d7d1a3fe1554b69f6b0412adca1807b37b0cad515
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:7c:e1:44:3b:54:76:10:51:30:72:6d:e0:db:64:57:fd:66:76:93]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 11:44:08.787  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 11:44:08.794 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 11:44:08.799 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:44:08.802 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 11:44:08.803  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:44:08.805  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 11:44:08.806  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 11:44:08.808 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 11:44:08.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 11:44:08.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 11:44:08.820 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 11:44:08.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:44:08.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:44:08.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:44:09.036  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 11:44:09.037  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 11:44:09.037 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 11:44:09.038 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:44:09.039  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 11:44:09.040  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 11:44:09.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:44:09.041 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:44:09.042 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:44:09.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:44:09.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:44:09.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:44:09.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:44:09.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:44:09.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:44:09.047 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 11:44:09.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:e2:cb:28:01:dd:12:1b:16:68:d6:f4:2a:f0:00:07:75:7d:9b:3e]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 11:47:46.211  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 11:47:46.213 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 11:47:46.214 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:47:46.215 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 11:47:46.216  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:47:46.217  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 11:47:46.217  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 11:47:46.218 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 11:47:46.218 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 11:47:46.219 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 11:47:46.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 11:47:46.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:47:46.226 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:47:46.227 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:47:46.431  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 11:47:46.432  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 11:47:46.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 11:47:46.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:47:46.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 11:47:46.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 11:47:46.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:47:46.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:47:46.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:47:46.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:47:46.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:47:46.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:47:46.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:47:46.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:47:46.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:47:46.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 11:47:46.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:be:37:dd:92:d7:83:df:a1:6f:d5:27:77:41:ba:87:a6:2e:13:00]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 11:52:30.731  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 11:52:30.734 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 11:52:30.738 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:52:30.740 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 11:52:30.740  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:52:30.741  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 11:52:30.742  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 11:52:30.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 11:52:30.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 11:52:30.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 11:52:30.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 11:52:30.750 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:52:30.750 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:52:30.751 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:52:30.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 11:52:30.959  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 11:52:30.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 11:52:30.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:52:30.962  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 11:52:30.963  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 11:52:30.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:52:30.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:52:30.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:52:30.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:52:30.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:52:30.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:52:30.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:52:30.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:52:30.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:52:30.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 11:52:30.975 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:c9:05:dc:37:ef:10:0f:4d:93:f0:99:d3:cd:35:e0:35:b9:d3:1f]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 11:56:35.507  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 11:56:35.511 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 11:56:35.513 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:56:35.515 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 11:56:35.516  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 11:56:35.517  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 11:56:35.517  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 11:56:35.518 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 11:56:35.518 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 11:56:35.518 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 11:56:35.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 11:56:35.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:56:35.526 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 11:56:35.527 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:56:35.697  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 11:56:35.698  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 11:56:35.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 11:56:35.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 11:56:35.702  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 11:56:35.702  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 11:56:35.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:56:35.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:56:35.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:56:35.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:56:35.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:56:35.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:56:35.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 11:56:35.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 11:56:35.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 11:56:35.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 11:56:35.711 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c8:d5:07:9f:50:bd:c7:4c:cf:d6:1d:69:11:7d:1e:84:16:7f:0a:70]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:00:19.596  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:00:19.600 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:00:19.602 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 12:00:19.603 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:00:19.603  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-07 12:00:19.604  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:00:19.605  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:00:19.605 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:00:19.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:00:19.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:00:19.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:00:19.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:00:19.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:00:19.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:00:19.928  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:00:19.929  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:00:19.929 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:00:19.930 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:00:19.933  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:00:19.934  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:00:19.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:00:19.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:00:19.936 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:00:19.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:00:19.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:00:19.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:00:19.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:00:19.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:00:19.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:00:19.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:00:19.944 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ba:77:e1:24:57:1e:a6:6c:f2:fb:84:9a:52:f5:73:79:e6:65:e5:6e]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:00:26.804  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:00:26.805 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:00:26.810 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:00:26.811 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:00:26.811  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:00:26.812  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:00:26.813  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:00:26.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:00:26.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:00:26.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:00:26.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:00:26.822 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:00:26.823 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:00:26.823 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:00:26.960  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:00:26.961  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:00:26.961 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:00:26.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:00:26.963  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:00:26.964  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:00:26.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:00:26.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:00:26.964 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:00:26.966 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:00:26.966 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:00:26.966 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:00:26.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:00:26.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:00:26.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:00:26.968 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:00:26.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: a77e5a71dbcd94eadfb110703506440d0657af85d8ffbce18199cf83b76c1834eccdb8c352623d8cdd9fe08cbf773c9c6f0b829fe4e6d84186a85d417e86c30b8ed74332f2d7b4360b60fbe5e0377ad94fa8b5ceed9fced48d7715dae05f49355388e4fd1b35e5f14b253b27e34c1a77d14ba13add81165a9ac32abf55f049b950178272e5d1557b0ec0f2ab8af4a9fd3f7056361b7767f2954009e4188739621e4e371b00f452e9444b9ce0c15bb4ecc79d8733c6e7deaac6e6c4811430ef5de76c8851a21df03cb0a1984f0be92fc51f4bb13d7b717b13c68911f34ea05bcf8f0f3bb103b28872abb7526c5fd12a59a1ae2409631d60d6e025a49a5d4c80e4708bd979690497b2c4e0d8b51e95882b0bcc4f9c6ac037feaa193c8323de820c445ffb388a541913cce31c1ca2c12e59f658f919e87c1cd533c0c0580d1e93dbe732ed97d7a3f6c31f2c8581d75a38d52f0f6f52bcb647d576dfee418deb777ea1163f728530c007cedfe81d7d1a3fe1554b69f6b0412adca1807b37b0cad515
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:c7:89:64:53:6a:3d:29:37:b6:50:1a:69:8c:25:92:f3:fe:7f:12]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:05:19.226  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:05:19.228 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:05:19.244 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:05:19.245 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:05:19.246  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:05:19.246  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:05:19.246  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:05:19.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:05:19.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:05:19.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:05:19.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:05:19.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:05:19.254 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:05:19.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:05:19.456  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:05:19.457  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:05:19.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:05:19.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:05:19.459  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:05:19.460  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:05:19.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:05:19.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:05:19.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:05:19.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:05:19.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:05:19.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:05:19.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:05:19.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:05:19.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:05:19.464 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:05:19.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:de:6a:86:91:eb:3d:f8:09:11:a5:06:aa:49:7a:ea:01:2f:34:fc]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:05:19.789  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:05:19.790 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:05:19.792 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 12:05:19.794 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:05:19.795  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-07 12:05:19.795  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:05:19.796  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:05:19.796 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:05:19.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:05:19.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:05:19.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:05:19.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:05:19.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:05:19.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:05:19.949  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:05:19.950  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:05:19.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:05:19.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:05:19.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:05:19.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:05:19.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:05:19.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:05:19.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:05:19.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:05:19.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:05:19.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:05:19.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:05:19.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:05:19.956 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:05:19.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:05:19.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:02:52:e9:a2:c4:83:d8:37:77:95:f8:b4:da:72:5b:24:82:e4:3b]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:05:43.345  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:05:43.346 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:05:43.347 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 12:05:43.348 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:05:43.348  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-07 12:05:43.348  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:05:43.349  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:05:43.349 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:05:43.349 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:05:43.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:05:43.354 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:05:43.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:05:43.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:05:43.355 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:05:43.512  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:05:43.513  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:05:43.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:05:43.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:05:43.515  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:05:43.516  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:05:43.516 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:05:43.517 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:05:43.517 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:05:43.518 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:05:43.519 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:05:43.519 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:05:43.520 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:05:43.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:05:43.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:05:43.522 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:05:43.527 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:2e:b6:a8:34:50:8b:03:79:e2:e3:0a:4e:5e:71:6d:a7:4d:d3:39]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:09:35.343  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:09:35.346 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:09:35.350 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:09:35.351 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:09:35.352  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:09:35.353  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:09:35.353  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:09:35.354 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:09:35.354 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:09:35.355 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:09:35.361 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:09:35.362 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:09:35.362 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:09:35.362 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:09:35.556  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:09:35.557  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:09:35.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:09:35.558 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:09:35.559  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:09:35.560  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:09:35.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:09:35.561 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:09:35.561 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:09:35.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:09:35.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:09:35.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:09:35.563 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:09:35.563 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:09:35.563 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:09:35.564 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:09:35.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:cd:41:1b:62:b9:9c:ff:53:93:9d:24:77:40:31:08:8e:32:29:7c]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:14:02.080  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:14:02.083 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:14:02.086 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:14:02.088 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:14:02.089  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:14:02.089  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:14:02.090  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:14:02.090 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:14:02.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:14:02.091 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:14:02.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:14:02.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:14:02.096 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:14:02.097 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:14:02.318  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:14:02.319  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:14:02.320 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:14:02.320 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:14:02.321  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:14:02.322  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:14:02.322 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:14:02.322 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:14:02.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:14:02.323 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:14:02.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:14:02.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:14:02.324 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:14:02.325 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:14:02.325 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:14:02.326 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:14:02.329 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: a77e5a71dbcd94eadfb110703506440d0657af85d8ffbce18199cf83b76c1834eccdb8c352623d8cdd9fe08cbf773c9c6f0b829fe4e6d84186a85d417e86c30b8ed74332f2d7b4360b60fbe5e0377ad94fa8b5ceed9fced48d7715dae05f49355388e4fd1b35e5f14b253b27e34c1a77d14ba13add81165a9ac32abf55f049b950178272e5d1557b0ec0f2ab8af4a9fd3f7056361b7767f2954009e4188739621e4e371b00f452e9444b9ce0c15bb4ecc79d8733c6e7deaac6e6c4811430ef5de76c8851a21df03cb0a1984f0be92fc51f4bb13d7b717b13c68911f34ea05bcf8f0f3bb103b28872abb7526c5fd12a59a1ae2409631d60d6e025a49a5d4c80e4708bd979690497b2c4e0d8b51e95882b0bcc4f9c6ac037feaa193c8323de820c445ffb388a541913cce31c1ca2c12e59f658f919e87c1cd533c0c0580d1e93dbe732ed97d7a3f6c31f2c8581d75a38d52f0f6f52bcb647d576dfee418deb777ea1163f728530c007cedfe81d7d1a3fe1554b69f6b0412adca1807b37b0cad515
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:31:84:d2:1d:c9:d9:95:e5:91:04:0d:84:fe:3a:e1:88:78:46:d4]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:18:45.014  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:18:45.016 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:18:45.019 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:18:45.019 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:18:45.020  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:18:45.021  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:18:45.021  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:18:45.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:18:45.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:18:45.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:18:45.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:18:45.029 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:18:45.029 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:18:45.029 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:18:45.251  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:18:45.252  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:18:45.252 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:18:45.252 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:18:45.254  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:18:45.254  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:18:45.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:18:45.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:18:45.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:18:45.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:18:45.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:18:45.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:18:45.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:18:45.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:18:45.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:18:45.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:18:45.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: a77e5a71dbcd94eadfb110703506440d0657af85d8ffbce18199cf83b76c1834eccdb8c352623d8cdd9fe08cbf773c9c6f0b829fe4e6d84186a85d417e86c30b8ed74332f2d7b4360b60fbe5e0377ad94fa8b5ceed9fced48d7715dae05f49355388e4fd1b35e5f14b253b27e34c1a77d14ba13add81165a9ac32abf55f049b950178272e5d1557b0ec0f2ab8af4a9fd3f7056361b7767f2954009e4188739621e4e371b00f452e9444b9ce0c15bb4ecc79d8733c6e7deaac6e6c4811430ef5de76c8851a21df03cb0a1984f0be92fc51f4bb13d7b717b13c68911f34ea05bcf8f0f3bb103b28872abb7526c5fd12a59a1ae2409631d60d6e025a49a5d4c80e4708bd979690497b2c4e0d8b51e95882b0bcc4f9c6ac037feaa193c8323de820c445ffb388a541913cce31c1ca2c12e59f658f919e87c1cd533c0c0580d1e93dbe732ed97d7a3f6c31f2c8581d75a38d52f0f6f52bcb647d576dfee418deb777ea1163f728530c007cedfe81d7d1a3fe1554b69f6b0412adca1807b37b0cad515
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:60:6e:70:33:62:d5:dc:35:9f:f9:ed:75:fe:aa:22:59:a7:1f:22]
            modulus: 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
    public exponent: 10001

] 
2022-06-07 12:22:59.954  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-07 12:22:59.956 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-07 12:22:59.958 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:22:59.959 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-07 12:22:59.959  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-07 12:22:59.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-07 12:22:59.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-07 12:22:59.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-07 12:22:59.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-07 12:22:59.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-07 12:22:59.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-07 12:22:59.966 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:22:59.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-07 12:22:59.967 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:23:00.170  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-07 12:23:00.170  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-07 12:23:00.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-07 12:23:00.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-07 12:23:00.172  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-07 12:23:00.173  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-07 12:23:00.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:23:00.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:23:00.173 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:23:00.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:23:00.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:23:00.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:23:00.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-07 12:23:00.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-07 12:23:00.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-07 12:23:00.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-07 12:23:00.183 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 387044810578360523330413439907346990897764339999
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Jun 07 10:13:46 UTC 2022
           Final Date: Sun Jun 06 10:13:45 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d6:85:62:ab:6c:70:4d:8a:7b:19:db:26:ea:97:b7:4c:85:ae:b2:f9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 499b56491b523cdc8b22372d975e4a8d3bf831c0
                       65631c8d7f9f9e17b76214e83710b2b03b351756
                       b9ab16123b0099433210eae55c12473db5e51b8a
                       47cd9d7581f592041dcf6d5b0e813cb89123e70c
                       dea349c7fcc475198040f7dcd96eb0180d54f612
                       31298b720ad63c313c8a6c2244c983ec9592f4eb
                       532ac8d63ebcaa85c4a179e813a3cf2be652a30d
                       4361377678d0e9b30582f5036b4fc777c5b945c4
                       d7da3c871c96d900de2211d3556a5e0b5ad77e37
                       bda44a12efa50b7b9e944f33845941ad3fd64d8b
                       a4232645d16d1bbe29173b6f66a7db16b6b0d9fd
                       5a24bd987889a95af4d59b001de06ac9d53eab18
                       3f620645133437bbe792c794f986f32de9685d88
                       aca880db24cc31c91bf448cb6175f50ccf9c63bf
                       ba974fc8a72e9a81864da870ad98e8313f08a5b9
                       e6989d59f76bcbf9716e3524f135bd0d33414d71
                       58c5a66ab58818c20e1c581dc0700cb5d4f3dbbc
                       f4d6a1b015622cbf0f06e63f5c075a777ae750cb
                       bb1b25128703420e9be3990af086b4b6454e8e69
                       b03c5a4d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:30:5e:a3:0b:96:d0:ea:d7:66:34:cf:c2:7e:f4:03:53:4f:1b:98]
            modulus: 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
    public exponent: 10001

]